Increasing Data Anonymity using AES and Privacy Technique
Data security and data preserve privacy had been an important area to a huge in recent years. However, rapid developments in collecting, analyzing, and using personal data had made privacy a very important issue. This thesis had addressed the problem the protect user data in the dataset from attac...
| Main Authors: | Thamer Khalil, Esmeel, Roslina, Abd Hamid, Rahmah, Mokhtar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Blue Eyes Intelligence Engineering & Sciences Publication
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/26079/ http://umpir.ump.edu.my/id/eprint/26079/1/Increasing%20Data%20Anonymity.pdf |
Similar Items
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021)
by: Arafat, N.H.M., et al.
Published: (2021)
Comparison of Statistic Prediction Results in Weka Explorer Interface and Experimenter Environment Interface on Dataset
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
A Hybrid Method For K-Anonymization Using Clustering Technique
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems
by: Luo, Entao, et al.
Published: (2018)
by: Luo, Entao, et al.
Published: (2018)
Collaborative healthcare information systems in privacy preservation based on K-anonymization model / Asmaa Hatem Rashid
by: Rashid, Asmaa Hatem
Published: (2014)
by: Rashid, Asmaa Hatem
Published: (2014)
A comparison of clustering algorithms for data anonymization / Zahra Mahmoud
by: Zahra, Mahmoud
Published: (2019)
by: Zahra, Mahmoud
Published: (2019)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Privacy-preserving fractal healthcare information system model based on K-anonymization to improve collaboration among physicians
by: Jarallah, Luma Fawaz
Published: (2017)
by: Jarallah, Luma Fawaz
Published: (2017)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
The lowdown on the AES
by: Habib, Shahanaaz
Published: (2012)
by: Habib, Shahanaaz
Published: (2012)
Acoustic Emission (Ae) Techniques For The Damage Assessment Of Structures.
by: Muhamad Bunnori, Nor Azura, et al.
Published: (2012)
by: Muhamad Bunnori, Nor Azura, et al.
Published: (2012)
Early detection of corrosion activity in reinforced concrete slab by AE technique
by: Ismail, Mohamed A., et al.
Published: (2006)
by: Ismail, Mohamed A., et al.
Published: (2006)
Anonymous: a social movement
by: Knight, William
Published: (2018)
by: Knight, William
Published: (2018)
Pseudonmization Techniques for Clinical Data: Privacy Study in Sultan Ismail Hospital Johor Bahru
by: Abd.Rahim, Y, et al.
Published: (2011)
by: Abd.Rahim, Y, et al.
Published: (2011)
AES bukan terbaik
by: Yusoff Bakri, Mohamad Hafiz
Published: (2019)
by: Yusoff Bakri, Mohamad Hafiz
Published: (2019)
Damage Evaluation Methods Of Structural Members Using Acoustic Emission (Ae) Technique
by: Panjsetooni, Alireza
Published: (2013)
by: Panjsetooni, Alireza
Published: (2013)
Randomness improvement of AES using MKP
by: Al-Alak, Saif, et al.
Published: (2013)
by: Al-Alak, Saif, et al.
Published: (2013)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003)
by: Armstrong, Helen, et al.
Published: (2003)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Anonymous feedback in e-learning systems
by: Dreher, Heinz
Published: (2005)
by: Dreher, Heinz
Published: (2005)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
A study of pipe leak source location using single channel acoustic emissions (AE) technique
by: Mohd Firzikri, Abd Sata
Published: (2009)
by: Mohd Firzikri, Abd Sata
Published: (2009)
Secure unlinkability schemes for privacy preserving data publishing in weighted social networks / Chong Kah Meng
by: Chong , Kah Meng
Published: (2020)
by: Chong , Kah Meng
Published: (2020)
Advanced Encryption Standard (AES)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
"I'd be so much more comfortable posting anonymously": Identified versus anonymous participation in student discussion boards
by: Roberts, Lynne, et al.
Published: (2013)
by: Roberts, Lynne, et al.
Published: (2013)
Get rid of yourself: toward an aesthetics of anonymity
by: Eckersley, David
Published: (2019)
by: Eckersley, David
Published: (2019)
The introduction of broker anonymity on the New Zealand Exchange
by: Poskitt, Russell, et al.
Published: (2011)
by: Poskitt, Russell, et al.
Published: (2011)
A tracable proactive anonymous electronic cash
by: Chang, Yu Cheng, et al.
Published: (2000)
by: Chang, Yu Cheng, et al.
Published: (2000)
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
Application of acoustic emission (AE) technique in various materials (metal, woods and bricks)
by: Musa, J.
Published: (2002)
by: Musa, J.
Published: (2002)
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
by: Ahmed, Shakil
Published: (2013)
by: Ahmed, Shakil
Published: (2013)
Secure mobile AES encryptor (SMAE)
by: Satia, Anbalagan
Published: (2016)
by: Satia, Anbalagan
Published: (2016)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
Similar Items
-
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020) -
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al. -
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021) -
Comparison of Statistic Prediction Results in Weka Explorer Interface and Experimenter Environment Interface on Dataset
by: Thamer Khalil, Esmeel, et al.
Published: (2019) -
Enhanced slicing-based anonymization approach for privacy-preserving data publishing with improved data utility
by: Mohammed Mahfoudh, Khamis Binjubeir
Published: (2024)